Pinned Repositories
-Mirai-Iot-BotNet
[Mirai] Mirai Iot Botnet && Tutorial !
-png-to-ico-png-to-jpg-jpg-to-ico-
tool to convert png , jpg image files to ico and use for malware attack ..
.github
README information
ICARCUS-Latest
Latest release of ICARCUS HVNC Full Version by noob pony(Ex-PegasusDev) and pwned by Mr. 1312 ;) Warning! Always use a RDP/hardened VM when running any tools from the internet. Have Fun ^_^ !
learn-python-course-100days
Download Udemy 100 Days of Code: The Complete Python Pro Bootcamp for 2022
LyDebug
一款使用C/C++语言开发实现的命令行应用层动态反汇编调试器,通过运用Windows系统下的调试API函数并配合Capstone反汇编引擎,实现x86与x64程序的动态调试。
LyMemory
一款内核级读写工具,可强制读写任意应用层进程内存数据,用于突破游戏驱动保护强行读写对端内存。
Windows-InjectCode
Windows 平台下C/C++实现的应用层多种注入方式整理。
X-KEYGEN
kalikex1's Repositories
kalikex1/CVE-2018-11776-Python-PoC
Working Python test and PoC for CVE-2018-11776, includes Docker lab
kalikex1/hack4lx-Anti-Shell
hack4lx-404 [Shell] Anti-Shell
kalikex1/CVE-2018-11776
Environment for CVE-2018-11776 / S2-057 (Apache Struts 2)
kalikex1/MD5Calc
Simple MD5 calculator
kalikex1/Pegasus-1
Carbanak leaked source
kalikex1/Pingpon-Exploit
Exploit for Mass Remote Code Execution on GPON home routers (CVE-2018-10562) obtained from Shodan.
kalikex1/opencv_demo
OpenCV Face Recognition Demo
kalikex1/GPON
Exploit for Remote Code Execution on GPON home routers (CVE-2018-10562) written in Python. Initially disclosed by VPNMentor (https://www.vpnmentor.com/blog/critical-vulnerability-gpon-router/), kudos for their work.
kalikex1/Linked-List
A linked list is a linear data structure where each element is a separate object. Each element (we will call it a node) of a list is comprising of two items - the data and a reference to the next node. The last node has a reference to null. The entry point into a linked list is called the head of the list.
kalikex1/browser-exploit-POC
kalikex1/NocturneSpy-Client
A cool Android spyware made with love ♥
kalikex1/NocturneSpy-Server
A custom Android spyware made with love.
kalikex1/PascalTriangle
PascalTriangle - Pelles C compiler
kalikex1/exploit-CVE-2015-3306
ProFTPd 1.3.5 - (mod_copy) Remote Command Execution exploit and vulnerable container
kalikex1/Pybomb
Python 3 script that compiles into a >32TB .pyc-file. Execute to deplete RAM, or compile for full 32TB file output: "python -m py_compile ./Pybomb.py"
kalikex1/Memfixed-Mitigation-Tool
DDoS mitigation tool for sending flush or shutdown commands to vulnerable Memcached servers obtained using Shodan API
kalikex1/Jigsaw-Ransomware
Source Code of Jigsaw Ransomware Created in Vb.Net
kalikex1/AWS-Scanner
Scans a list of websites for Cloudfront or S3 Buckets
kalikex1/Binary-Search
Binary search is a search algorithm that finds the position of a target value within a sorted array.
kalikex1/badusb_examples
This repository have some BadUSB attack examples for Arduino IDE compatible devices
kalikex1/Telnet-Chatroom
Turn your Arduino (UNO) into a telnet chatroom server! Good for sharing links between multiple computers, or just chatting.
kalikex1/UACME
Defeating Windows User Account Control
kalikex1/Basic-Keylogger
Windows based keylogger (written in C++). Collects all keystrokes and places them in a file "LOG.txt" in the same directory as its binaries.
kalikex1/Infosec_Reference
An Information Security Reference That Doesn't Suck
kalikex1/EQGRP-Warez
The ORIGINAL decrypted copies of the Shadow Broker's Don't Forget Your Base release. Contains Equation group's collection of tools primarily for compromising Linux/Unix based environments. Use for research purposes only. (ref: eqgrp-auction-file.tar.xz)
kalikex1/EQGRP-TrickOrTreat
The ORIGINAL decrypted copies of the Shadow Broker's Trick Or Treat release. Contains a list of servers, supposedly compromised by Equation Group as well as references to seven supposedly undisclosed tools (DEWDROP, INCISION, JACKLADDER, ORANGUTAN, PATCHICILLIN, RETICULUM, SIDETRACK AND STOCSURGEON) also used by the threat actor.
kalikex1/EquationDrug
The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use for research purposes only.
kalikex1/meesho
api server
kalikex1/Invisible-Login-Forms
Stealing user credentials by injecting invisible login forms that the native browser autofills data to. More info: https://freedom-to-tinker.com/2017/12/27/no-boundaries-for-user-identities-web-trackers-exploit-browser-login-managers/
kalikex1/RTF_11882_0802
PoC for CVE-2018-0802 And CVE-2017-11882